From: tcmay@got.net (Tcmay@got.net)
To: cypherpunks@toad.com
Message Hash: 3af24ad03e7ed222b653aed388ae0b4502b3f22444ac2c19cb2e278d08139aca
Message ID: <9509201546165270@ci.diamond-bar.ca.us>
Reply To: N/A
UTC Datetime: 1995-09-20 23:25:01 UTC
Raw Date: Wed, 20 Sep 95 16:25:01 PDT
From: tcmay@got.net (Tcmay@got.net)
Date: Wed, 20 Sep 95 16:25:01 PDT
To: cypherpunks@toad.com
Subject: CLAIMING CHUNKS OF KEYSPACE...
Message-ID: <9509201546165270@ci.diamond-bar.ca.us>
MIME-Version: 1.0
Content-Type: text/plain
Date: Mon, 28 Aug 1995 23:02:01 -0700
To: cypherpunks@toad.com
From: tcmay@got.net (Timothy C. May)
Subject: Claiming chunks of keyspace...
Looking at it from the outside, I thought the latest SSL challenge
experiences were highly instructive. Nothing to be ashamed of.
An interesting question: Is it a valid approach for J. Random User to
"claim" some chunk of keyspace to search?
If the "reward" of finding the gold buried in the keyspace (a key that
meets the challenge) is high and the cost of claiming the keyspace is low
(or nil), then game theory tells us that some folks will be tempted to
claim a bigger chunk of keyspace than they can possibly process.
What can be done to reduce this effect?
On the negative side, ostracize or punish those who bite off more than they
can chew. This approach is fraught with dangers.
On the positive side, let everyone simply attack the keyspace as they see
fit, picking random parts to attack. This should not be "worse" than a
factor of several from a "perfectly coordinated" attack. (I haven't spent
time calculating this, but my intuition is that a random attack, with
overlapping keyspace, is not a lot less efficiently attacked than
attempting to arrange for no overlaps...just based on my mental picture of
dropping line segments randomly on some interval and figuring coverage of
the line segment.)
In between, market systems where itermediate agents subcontract out chunks
of keyspace. Mechanisms for this are lacking.
-Tim May
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^756839 | black markets, collapse of governments.
"National borders are just speed bumps on the information superhighway."
Return to September 1995
Return to “tcmay@got.net (Tcmay@got.net)”
1995-09-20 (Wed, 20 Sep 95 16:25:01 PDT) - CLAIMING CHUNKS OF KEYSPACE… - tcmay@got.net (Tcmay@got.net)